7:00-8:15 |
Registration and Breakfast
|
8:15-8:30 |
Introduction and Logistics
|
8:30-9:15 |
Keynote
Rethinking AppSec: Using Security Instrumentation to Find Vulnerabilities and Block Attacks |
9:15-9:30 |
Beverage Break / Networking
|
9:15-4:55 |
Wells Fargo Capture the Flag Virtual Game
|
9:30-10:15 |
Breakout Panel
Panel Moderator - Career Panel & Before, During and After the BreachPanel: Before During and After the Breach |
9:30-10:15 |
BreakoutAdvances in Standards-based API Security
Running a Cloud-Powered Business Without Security Compromises
Architectural Risk Analysis - A Systems Design Approach to Threat Modeling
Managing Application Zero Day Vulnerabilities
|
10:30-11:15 |
Keynote
The State of Cyber: How stealthier attacks are blurring the lines between Cybercrime and Statecraft |
11:20-12:05 |
BreakoutCyber and User Behavior Analytics
Future of Cybersecurity Regulation and Enforcement in the U.S.
Life After Ukraine; Industrial Control System Cybersecurity Industry Trends and Strategies
How to Build Security and Risk Management into Agile Environments
Risk Based Approach to Attack Surface Susceptibility and Validation |
12:05-1:30 |
Lunch
|
1:40-2:25 |
Announcements - Keynote
Hacking our Humanity: Biotechnology, Biohackers and the Edges of Discovery |
2:30-3:15 |
BreakoutBuilding Your Sec Ops Use Case
Real Time Cyber Intelligence
CCAA Innovation in Cybersecurity Automation
|
3:15-3:30 |
Beverage Break - Networking
|
3:35-4:15 |
BreakoutDeception Inception
DDoS Attacks: Lesson learned from analyzing 10,000 incidents and a case study
The Continued Prevalence of People and Processes Over Technology
|
3:35-4:15 |
Breakout Panel
Panel: Know Your Employees, Stop Insider Threats |
4:20-4:55 |
CISO Closing Panel
Panel: Career Panel - Today's Cybersecurity Careers Landscape |
4:55-5:00 |
Closing Session
|